Vulnerabilities > CVE-2003-0307 - Remote Security vulnerability in Poster Version.Two

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
poster
nessus

Summary

Poster version.two allows remote authenticated users to gain administrative privileges by appending the "|" field separator and an "admin" value into the email address field.

Vulnerable Configurations

Part Description Count
Application
Poster
1

Nessus

NASL familyCGI abuses
NASL idPOSTER_VERSION_TWO.NASL
descriptionThe remote host is running
last seen2020-06-01
modified2020-06-02
plugin id11629
published2003-05-14
reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11629
titlePoster version.two index.php Account Manipulation Privilege Escalation
code
#
# (C) Tenable Network Security, Inc.
#

# Ref:
#  From: "Peter Winter-Smith" <[email protected]>
#  To: [email protected]
#  Date: Wed, 14 May 2003 11:19:04 +0000
#  Subject: [VulnWatch] Vulnerability in ' poster version.two'



include("compat.inc");

if (description)
{
 script_id(11629);
 script_version ("1.16");
 script_cvs_date("Date: 2018/08/13 14:32:36");
 script_cve_id("CVE-2003-0307");

 script_name(english:"Poster version.two index.php Account Manipulation Privilege Escalation");

 script_set_attribute(attribute:"synopsis", value:
"A remote web application can be reconfigured." );
 script_set_attribute(attribute:"description", value:
"The remote host is running 'poster version.two' a news posting
system written in PHP.

There is a flaw in this version that allows new users to enter a 
specially crafted name that could allow them to gain administrative
privileges on this installation." );
 script_set_attribute(attribute:"solution", value:
"None at this time - disable this CGI." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N");

 script_set_attribute(attribute:"plugin_publication_date", value: "2003/05/14");
 script_set_attribute(attribute:"vuln_publication_date", value: "2003/05/14");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();

 script_summary(english:"Checks if Poster version.two is installed");
 script_category(ACT_GATHER_INFO);
 script_family(english:"CGI abuses");
 script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");
 script_dependencie("webmirror.nasl", "http_version.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_keys("www/PHP");
 exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");



port = get_http_port(default:80, embedded: 0);
if(!can_host_php(port:port))exit(0);

dir = list_uniq(make_list("/poster", cgi_dirs()));
		
foreach d (dir)
{
 r = http_send_recv3(method: "GET", item:d + "/index.php", port:port);
 if (isnull(r)) exit(0);
 res= r[0]+r[1]+'\r\n'+r[2];
 if("<title>poster version.two</title>" >< res &&
    "?go=check" >< res &&
    "poster version.two: login" >< res){
    	security_warning(port);
	exit(0);
	}
}